Security Considerations in Modular Mobile Manipulation

Mobile manipulation will play an essential role in future production’s intralogistics. In addition, it can be assumed that location-independence of manipulation will greatly contribute to flexible production and higher efficiency in robot use. Modular mobile manipulators can be combined from standalone robotic components like mobile platforms and serial arms. This combination enables more flexibility since the robot can be adapted to specific use-cases by exchanging hardware. However, since those robots tend to be very complex systems, their integration into networked Industry 4.0 environments will also cause security risks. In this paper, we present a security architecture and secure interaction workflows for modular mobile manipulators that on the one hand secure the system against unauthorized manipulation and on the other hand enable the integration of mobile manipulators into larger IT infrastructures. Using the example of our inhouse-developed CHIMERA mobile manipulator, we show which architectural means can be considered in order to make a modular mobile manipulator secure. We analyze the expected attack vectors on mobile manipulators and describe their mitigation within our architecture.

[1]  Stefanie Tellex,et al.  Scanning the Internet for ROS: A View of Security in Robotics Research , 2018, 2019 International Conference on Robotics and Automation (ICRA).

[2]  Henrik I. Christensen,et al.  SROS: Securing ROS over the wire, in the graph, and through the kernel , 2016, ArXiv.

[3]  Peter Schartner,et al.  Secure Data Recording and Bio-Inspired Functional Integrity for Intelligent Robots , 2018, 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).

[4]  Peter Schartner,et al.  Security for the Robot Operating System , 2017, Robotics Auton. Syst..

[5]  Agostino Cortesi,et al.  SROS1: Using and Developing Secure ROS1 Systems , 2019 .

[6]  Jongkil Kim,et al.  Security and Performance Considerations in ROS 2: A Balancing Act , 2018, ArXiv.

[7]  Peter Fairley,et al.  Cybersecurity at U.S. utilities due for an upgrade: Tech to detect intrusions into industrial control systems will be mandatory [News] , 2016 .

[8]  Micael S. Couceiro,et al.  On the Security of Robotic Applications Using ROS , 2018, Artificial Intelligence Safety and Security.

[9]  Peter Schartner,et al.  Secure communication for the robot operating system , 2017, 2017 Annual IEEE International Systems Conference (SysCon).

[10]  Agostino Cortesi,et al.  Procedurally Provisioned Access Control for Robotic Systems , 2018, 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).

[11]  David Mascareñas,et al.  A preliminary cyber-physical security assessment of the Robot Operating System (ROS) , 2013, Defense, Security, and Sensing.

[12]  Bernhard Dieber,et al.  Volatile memory forensics for the Robot Operating System , 2018, ArXiv.

[13]  Karen A. Scarfone,et al.  Guide to Industrial Control Systems (ICS) Security , 2015 .

[14]  Nell Nelson,et al.  The Impact of Dragonfly Malware on Industrial Control Systems , 2020 .

[15]  Oussama Khatib,et al.  Mobile manipulation: The robotic assistant , 1999, Robotics Auton. Syst..

[16]  E. Byres,et al.  The Myths and Facts behind Cyber Security Risks for Industrial Control Systems , 2004 .

[17]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.3 , 2018, RFC.

[18]  Gorka Olalde Mendia,et al.  Towards an open standard for assessing the severity of robot security vulnerabilities, the Robot Vulnerability Scoring System (RVSS) , 2018, ArXiv.

[19]  Erik Tews,et al.  Introducing the Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics , 2018, ArXiv.

[20]  Vicente Matellán Olivera,et al.  Message Encryption in Robot Operating System: Collateral Effects of Hardening Mobile Robots , 2018, Front. ICT.

[21]  Peter Schartner,et al.  Application-level security for ROS-based applications , 2016, 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).

[22]  Stamatis Karnouskos,et al.  Stuxnet worm impact on industrial cyber-physical system security , 2011, IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society.

[23]  Adriano Valenzano,et al.  Review of Security Issues in Industrial Networks , 2013, IEEE Transactions on Industrial Informatics.

[24]  Lander Usategui San Juan,et al.  The shift in the robotics paradigm — The Hardware Robot Operating System (H-ROS); an infrastructure to create interoperable robot components , 2017, 2017 NASA/ESA Conference on Adaptive Hardware and Systems (AHS).